// For flags

CVE-2023-6070

 

Severity Score

4.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A server-side request forgery vulnerability in ESM prior to version 11.6.8 allows a low privileged authenticated user to upload arbitrary content, potentially altering configuration. This is possible through the certificate validation functionality where the API accepts uploaded content and doesn't parse for invalid data

Una vulnerabilidad de server-side request forgery en ESM anterior a la versión 11.6.8 permite que un usuario autenticado con pocos privilegios cargue contenido arbitrario, alterando potencialmente la configuración. Esto es posible a través de la funcionalidad de validación de certificados donde la API acepta contenido cargado y no analiza datos no válidos.

*Credits: Andre Waldhoff (condignum GmbH), Johannes Bär (condignum GmbH)
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-11-10 CVE Reserved
  • 2023-11-29 CVE Published
  • 2024-10-11 CVE Updated
  • 2024-10-29 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
  • CAPEC-176: Configuration/Environment Manipulation
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Trellix
Search vendor "Trellix"
Enterprise Security Manager
Search vendor "Trellix" for product "Enterprise Security Manager"
< 11.6.8
Search vendor "Trellix" for product "Enterprise Security Manager" and version " < 11.6.8"
-
Affected